{"result": {"nessus": [{"published": "2013-11-27T00:00:00", "type": "nessus", "cvss": {"vector": "AV:NETWORK/AC:MEDIUM/Au:NONE/C:PARTIAL/I:PARTIAL/A:PARTIAL/", "score": 6.8}, "description": "Multiple vulnerabilities was found and corrected in bugzilla :\n\nCross-site request forgery (CSRF) vulnerability in process_bug.cgi in Bugzilla 4.4.x before 4.4.1 allows remote attackers to hijack the authentication of arbitrary users for requests that modify bugs via vectors involving a midair-collision token (CVE-2013-1733).\n\nCross-site request forgery (CSRF) vulnerability in attachment.cgi in Bugzilla 2.x, 3.x, and 4.0.x before 4.0.11; 4.1.x and 4.2.x before 4.2.7; and 4.3.x and 4.4.x before 4.4.1 allows remote attackers to hijack the authentication of arbitrary users for requests that commit an attachment change via an update action (CVE-2013-1734).\n\nMultiple cross-site scripting (XSS) vulnerabilities in editflagtypes.cgi in Bugzilla 2.x, 3.x, and 4.0.x before 4.0.11; 4.1.x and 4.2.x before 4.2.7; and 4.3.x and 4.4.x before 4.4.1 allow remote attackers to inject arbitrary web script or HTML via the (1) id or (2) sortkey parameter (CVE-2013-1742).\n\nMultiple cross-site scripting (XSS) vulnerabilities in report.cgi in Bugzilla 4.1.x and 4.2.x before 4.2.7 and 4.3.x and 4.4.x before 4.4.1 allow remote attackers to inject arbitrary web script or HTML via a field value that is not properly handled during construction of a tabular report, as demonstrated by the (1) summary or (2) real name field. NOTE: this issue exists because of an incomplete fix for CVE-2012-4189 (CVE-2013-1743).\n\nThe updated packages have been upgraded to the 4.2.7 version which is not affected by these issues.", "title": "Mandriva Linux Security Advisory : bugzilla (MDVSA-2013:285)", "lastseen": "2016-09-26T17:25:22", "cvelist": ["CVE-2013-1733", "CVE-2013-1742", "CVE-2013-1743", "CVE-2013-1734"], "href": "https://www.tenable.com/plugins/index.php?view=single&id=71099", "id": "MANDRIVA_MDVSA-2013-285.NASL"}, {"published": "2013-10-31T00:00:00", "type": "nessus", "cvss": {"vector": "AV:NETWORK/AC:MEDIUM/Au:NONE/C:PARTIAL/I:PARTIAL/A:PARTIAL/", "score": 6.8}, "description": "According to its banner, the version of Bugzilla installed on the remote host is affected by multiple vulnerabilities :\n\n - A cross-site request forgery vulnerability exists due to a flaw in token validation in 'process_bug.cgi'. Note that this only affects versions 4.4rc1 to 4.4.\n (CVE-2013-1733)\n\n - A cross-site request forgery vulnerability exists due to a flaw in the validation of HTTP requests when updating attachments with the 'attachment.cgi' script. Note that this affects versions 2.16rc1 to 4.0.10, 4.1.1 to 4.2.6, and 4.3.1 to 4.4. (CVE-2013-1734)\n\n - A cross-site scripting vulnerability exists due to improper parameter validation in 'editflagtypes.cgi'.\n Note that this affects versions 2.17.1 to 4.0.10, 4.1.1 to 4.2.6, and 4.3.1 to 4.4. (CVE-2013-1742)\n\n - A cross-site scripting vulnerability exists due to incorrectly filtered field values in tabular reports.\n Note that this affects 4.1.1 to 4.2.6 and 4.3.1 to 4.4.\n (CVE-2013-1743)\n\nNote that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.", "title": "Bugzilla < 4.0.11 / 4.2.7 / 4.4.1 Multiple Vulnerabilities", "lastseen": "2016-09-26T17:25:48", "cvelist": ["CVE-2013-1733", "CVE-2013-1742", "CVE-2013-1743", "CVE-2013-1734"], "href": "https://www.tenable.com/plugins/index.php?view=single&id=70720", "id": "BUGZILLA_4_4_1.NASL"}, {"published": "2013-10-18T00:00:00", "type": "nessus", "cvss": {"vector": "AV:NETWORK/AC:MEDIUM/Au:NONE/C:PARTIAL/I:PARTIAL/A:PARTIAL/", "score": 6.8}, "description": "A Bugzilla Security Advisory reports:Cross-Site Request Forgery When a user submits changes to a bug right after another user did, a midair collision page is displayed to inform the user about changes recently made. This page contains a token which can be used to validate the changes if the user decides to submit his changes anyway. A regression in Bugzilla 4.4 caused this token to be recreated if a crafted URL was given, even when no midair collision page was going to be displayed, allowing an attacker to bypass the token check and abuse a user to commit changes on his behalf. Cross-Site Request Forgery When an attachment is edited, a token is generated to validate changes made by the user. Using a crafted URL, an attacker could force the token to be recreated, allowing him to bypass the token check and abuse a user to commit changes on his behalf. Cross-Site Scripting Some parameters passed to editflagtypes.cgi were not correctly filtered in the HTML page, which could lead to XSS. Cross-Site Scripting Due to an incomplete fix for CVE-2012-4189, some incorrectly filtered field values in tabular reports could lead to XSS.", "title": "FreeBSD : bugzilla -- multiple vulnerabilities (e135f0c9-375f-11e3-80b7-20cf30e32f6d)", "lastseen": "2016-09-26T17:24:00", "cvelist": ["CVE-2013-1733", "CVE-2013-1742", "CVE-2013-1743", "CVE-2013-1734"], "href": "https://www.tenable.com/plugins/index.php?view=single&id=70485", "id": "FREEBSD_PKG_E135F0C9375F11E380B720CF30E32F6D.NASL"}], "freebsd": [{"published": "2013-10-16T00:00:00", "type": "freebsd", "cvss": {"vector": "AV:NETWORK/AC:MEDIUM/Au:NONE/C:PARTIAL/I:PARTIAL/A:PARTIAL/", "score": 6.8}, "description": "\nA Bugzilla Security Advisory reports:\n\nCross-Site Request Forgery\nWhen a user submits changes to a bug right after another\n\t user did, a midair collision page is displayed to inform\n\t the user about changes recently made. This page contains\n\t a token which can be used to validate the changes if the\n\t user decides to submit his changes anyway. A regression\n\t in Bugzilla 4.4 caused this token to be recreated if a\n\t crafted URL was given, even when no midair collision page\n\t was going to be displayed, allowing an attacker to bypass\n\t the token check and abuse a user to commit changes on his\n\t behalf.\nCross-Site Request Forgery\nWhen an attachment is edited, a token is generated to\n\t validate changes made by the user. Using a crafted URL,\n\t an attacker could force the token to be recreated,\n\t allowing him to bypass the token check and abuse a user\n\t to commit changes on his behalf.\nCross-Site Scripting\nSome parameters passed to editflagtypes.cgi were not\n\t correctly filtered in the HTML page, which could lead\n\t to XSS.\nCross-Site Scripting\nDue to an incomplete fix for CVE-2012-4189, some\n\t incorrectly filtered field values in tabular reports\n\t could lead to XSS.\n\n", "title": "bugzilla -- multiple vulnerabilities", "lastseen": "2016-09-26T17:24:27", "cvelist": ["CVE-2013-1733", "CVE-2013-1742", "CVE-2013-1743", "CVE-2013-1734"], "href": "https://vuxml.freebsd.org/freebsd/e135f0c9-375f-11e3-80b7-20cf30e32f6d.html", "id": "E135F0C9-375F-11E3-80B7-20CF30E32F6D"}]}}